General

  • Target

    1760-60-0x0000000000400000-0x000000000043A000-memory.dmp

  • Size

    232KB

  • MD5

    ef0773d89e75c5e9e6f76232f86a9879

  • SHA1

    ffa784d44ec1e49588b2e52ce22c56dca3839563

  • SHA256

    6996f80f9e88e599bf61ffe9d512951959c1f60207fcabd2c599e08f23b6c837

  • SHA512

    0242099b337456fa7607f00d03e799c7402fd0676bf4510823ce9ad66375810b885cae27f426f5916a49f250fcb55e08540ab4521babcd7053a6b112d2dca354

  • SSDEEP

    6144:YClw10TEMLyE5xYNiFTUxm51R01MdIxsHU/4DeiH0FCu2:YC+0TEML1Xc+Fwg

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://transiberia.ge
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    m2m*0P{gp#&o

Signatures

Files

  • 1760-60-0x0000000000400000-0x000000000043A000-memory.dmp
    .exe windows x86


    Headers

    Sections